Thursday, August 27, 2020

Eulogy for Mother :: Eulogies Eulogy

Tribute for Mother It is difficult for me to accept she’s gone, my essential impact, sustainer, supporter and most astute advocate has left me genuinely. Mother was such a functioning member in this world right to her absolute final gasp. I am so thankful to have been with her on her last day. At his point she was battling to shape words and get them out, however her psyche was caution, mindful and caring. She was as yet stressed over me, a mother as far as possible. During our discussion I referenced that when I left her I would eat with my cousin Alison and companion Keith and she let me know, though with some level of trouble, to VAMOOSE. She needed me to be off having fun. We had a brilliant visit discussed up and coming occasions in both our lives. I inquired as to whether she was disheartened and she answered, â€Å"no†, a trooper as far as possible. I left her inclination hopeful, not mindful that I had given her, her last kiss. What a respect! I experience never had any difficulty singing my mother’s acclaims. My loved ones realize that I generally valued and appreciated her. I never dithered to remember her for my exercises or social occasions, realizing without a doubt that she would presumably be the most intriguing individual there. A demonstration of this was the wide assortment old enough gatherings and individuals she had as companions. Not many individuals knew mum’s age, and this was for an excellent explanation. She felt if individuals knew her age they may very well discount her, as basically another more established woman, those of us who realized her never committed that error. She was so resolute about staying quiet about her age that she wouldn’t let me set up her a 80th birthday celebration party for that would unmistakably let the undeniable out of the pack. Mum was above all else our mom, an occupation she paid attention to very, we were forever her essential concern and like most moms she proceeded with her watch straight up to the end. One of her demeanors was, â€Å"you didn’t grow up coincidentally you know!† from the get go I didn’t know very what this should mean†¦ yet I came to realize this implied she had committed her life to our stewardship and she had endeavored to impart her qualities and characteristics. Her most eminent characteristics were her wild unwaveringness to every last bit of her family, her own balance, style, effortlessness, abilities and insight.

Saturday, August 22, 2020

Bassanios reactions Essay Example

Bassanios responses Essay Example Bassanios responses Essay Bassanios responses Essay Both in the play and the film, Shylock is introduced as an extremely strict man through the coarse speech utilized. [He loathes Antonio] for he is a Christian; The words a Christian recommend that Shylock trusts Christians are something different which is totally unfamiliar to his own clan. Likewise, when Bassanio requests that Shylock eat with him, Shylock has such a solid response and accentuates on the word you as anaphora to state out the enormous distinction between them. As Shylock is stating this discourse in the film, he puts his left hand on the chest with a consistent articulation in the eyes as though he is demonstrating his outright unwaveringness to God.When Antonio first shows up in the play, Shylock talks as monologue to tell the crowd his genuine idea. On the off chance that [he] can get [Antonio] upon the hip, [he] will take care of fat the old resentment [he] [bears] him. The crowd is stunned by how coldblooded and solid the retribution is, particularly the word fat gives us a nauseating picture that we would nearly feel tired of how crazy Shylock is.Surprisingly, this alarming discourse has been forgotten about in the film. Rather, the contempt is uncovered to the watchers through the (nearby camera/camera-shot?) on the wide-opened gazing eyes of Shylock and his profound, overwhelming tone when he answers Bassanio, I am bantering of my current store,. Obviously, the impact is far less amazing than the words.Then Shylock starts to discuss the manner in which he has been abused, similar to a more unusual mongrel, just as in the film where he has been communicated to be much increasingly forsaken. At the point when they stroll into Shylocks office from the boisterous swarmed road, the foundation of the workplace promptly draws the crowds consideration it is dim and untidy with just a couple of spiked windows as though the room is a jail. At that point Shylock utilizes a substantial and pale tone to discuss his abuse like a detainee asking for le niency! The language, air and the tone have caused Shylock to appear to be much more fragile than both the crowd and watchers have perhaps expected, and because of the human instinct, men consistently will in general secure the frail individuals so the crowd would likely be very thoughtful with Shylock regardless of his past negative image.The crowd presumably would have been persuaded that Shylock is really the na㠯⠿â ½ve. Why look how you storm! I would be companions with you, and have your adoration what a benevolent offer that seems like, particularly when he outstretches his arms as though he would give Antonio all he has!However, his picture before long goes to noxious after he has requested an equivalent bound of Antonios reasonable tissue as a relinquish. The crowd promptly understands that Shylock has not overlooked the retribution by any stretch of the imagination, and the words reasonable substance really mean great tissue in light of the fact that Antonio is a dece nt Christian. We are completely agitated and alarmed by the evilness of the dishonest Jew.Yet in the film, Shylock just calmly stands up and gets the agreement as he declares the bound with a brief delay before he says an equivalent pound of your reasonable substance. This appears to persuade the watchers that Shylock says it as a joke which has quite recently gone up his psyche trying to make Shylock look considerably more reasonable.On the other hand, Antonio is communicated to be significantly more vulnerable in his strict contrasted with Shylock as he breaks the custom of neither loaning nor acquiring for Bassanio. However his adoring and obliging trademark is so a lot more grounded and is indicated completely which absolutely satisfies the crowds desire for a protagonist.Nevertheless, when Antonio concedes that he will spit and kick once more, the crowd is most likely disillusioned of knowing his negative side. How could a legend be so cowardly and biased against somebody uniqu e? However Antonio shows his trustworthiness on a reasonable side. In the film, Antonio is irritated with Shylocks words and is anxious to stand up his idea, indicating his honorable and honest trademark contrasted with the double dealing Jew.But the environment is before long loaded up with uneasiness as Antonio says, Exact the punishment. In the wake of having heard the detestable discourse, the word punishment resembles putting a picture for the end! Despite the fact that Antonio is so sure, the crowd can without much of a stretch sense the threat and think Antonio is egotistical and stupid!When shylock reports the bound in the film, notwithstanding, there is a (camera-shot/close camera?) on Antonio, indicating the speedy difference in articulation from pompous to restless, particularly when he chomps his thumb with a solidified and uncomfortable grin, the watchers are sure that Antonio is profoundly pained. Once more, this additionally shows the incredible fatherly love among An tonio and bassanio!Bassanio is crucial for the crowd to profoundly comprehend the connection among Shylock and Antonio.When Shylock says, Antonio is a decent man-, Bassanios response shows that great methods ethically great in the Christian culture where as in the Jewish culture, great methods having the option to take care of!, expressing their enormous contrast both is strict and contemplations, just as molding the covetous picture of Jews.In the film, Antonio and Shylock don't address each other straight away. Rather, Bassanio is utilized as an association between them, indicating their muddled relationship-lack of respect, contempt and suspicious.Also, Bassanio interfaces the crowd to the phase by getting their considerations and emotions. This were graciousness. Just as the intensed articulation with the profound tone demonstrated intently in the film when Antonio takes the bound. This is all speaking to the crowd. Then again, he additionally lets Antonio completely express his unlimited love.

Friday, August 21, 2020

The 101 on Health Savings Accounts

The 101 on Health Savings Accounts The 101 on Health Savings Accounts The 101 on Health Savings AccountsAn HSA can help you avoid going into debt over unexpected medical expenses. Learn how they work and how they can boost both your savings and take-home pay.National Health Savings Account (HSA) Awareness Day was   October 15, but that doesnt mean we should stop talking about ways to save and hang on to our hard-earned money.As a follow up to HSA Awareness Day, we thought we’d explore this highly beneficial savings tool.Although more and more Americans are signing up for health savings accounts (22 million in 2017, according to one survey), many folks who are eligible to open an account don’t have one. Today we’ll examine HSAs by exploring what they are and who qualifies for one, along with the pros and cons of opening one.Health savings accounts: an overviewHealth Savings Accounts, or HSAs, were first established on a federal level in 2003, via the Medicare Prescription Drug, Improvement, and Modernization Act, to help people with potentially ex pensive health insurance plans pay for medical expenses.In simpler terms: They are tax-advantaged personal savings accounts that allow you to save money specifically for health expenses. What does “tax-advantaged” mean? It means the money you save is taken out from your paycheck before you are charged income taxes on the rest. In other words, you don’t have to pay taxes on the money you save, as long as you use it for a qualifying expense (more on that in a moment).Who is eligible for an HSA?Unfortunately, not everyone qualifies to open an HSA. In order to be eligible, you must first be enrolled in a high-deductible health insurance plan, or an HDHP. As of 2019, the IRS defines an HDHP is any health insurance plan in which the deductible (the amount you have to pay toward medical costs before certain insurance benefits kick in) is at least $1,350 for an individual or $2,700 for a family.With an HDHP, you can’t have yearly out-of-pocket expenses (all the deductibles, coinsura nce, copays, etc. that you are responsible for) greater than $6,750 for an individual or $13,500 for a family. If you have one of these plans, you will want to make sure you understand all of the potential out-of-pocket costs that may surprise you.It’s important to keep in mind that the IRS changes how it defines HDHPs. For example, in 2020, the HDHP’s deductibles will increase to at least $1,400 for an individual and $2,800 for a family. You should check the IRS’s HSA page for the latest information every year.If you do have an HDHP, you still have to meet other criteria in order to be eligible for an HSA: You can’t have other health insurance (unless it’s eligible coverage, such as dental and vision coverage), you can’t be enrolled in Medicare, and you can’t be claimed as a dependent on someone’s tax return.Why is an HSA beneficial?When used correctly, HSAs can be extremely beneficial. Think about those HDHP deductible and other out-of-pocket costs. When you or you r family needs medical attention, you are on the hook for at least as much as your deductible (as much as $2,700) and a max of $13,500 â€" an amount that is easy to rack up in the United States, where average medical costs are inflated and far outstrip those in other developed nations. Do you have $13,500 (or even $2,700) laying around in a given year? Probably not, which is why the HSA is around. It helps you save for the unexpected so you don’t have to tap into other means to cover your emergencies.HDHPs are attractive to those on a budget because they tend to have lower premiums â€"t he upfront money you pay every month for your coverage. Theoretically, the money you save on premiums can be funneled tax-free into an HSA, where it will accrue tax-free interest until you need to spend it   on qualified medical expenses. You will not be taxed to use the funds either.If you save a little bit each month until you have enough to pay for your deductible, for example, then you’d neve r have to worry about being able to afford your deductible when medical expenses crop up (and they always do).Additionally, the money you contribute to an HSA has the potential to reduce your taxable income, which means you may not have to pay as much in income taxes. That gives you more real spending money.Medical debt is a huge problem in the United States. In 2018 Americans collectively borrowed $88 million for medical expenses they couldn’t afford. Many people turn to risky payday loans or other types of personal loans to pay for medical debt, and research suggests that increased medical debt is associated with increased payday loan debt. It’s a cycle you don’t want to be a part of, and HSAs can help you build a nest egg for when you need it most.How much money can you save in an HSA?Every year, the IRS determines the max amount of money you can contribute to an HSA. In tax year 2019, you can contribute up to $3,500 a year if you have an individual plan, or up to $7,000 in the year if your family is also covered on your plan. In 2020, you’ll be able to contribute up to $7,100 if you have a family plan.The money you save in your HSA account rolls over from one year to the next, so your savings can keep growing and growing as long as you contribute. And one of the best things about HSAs? The money is always yours to spend, even if you have to drop your HSA-eligible plan, such as when you change jobs or switch to an insurance plan that is no longer eligible.How can you spend your savings?Okay, so what can you spend your savings on? Qualified medical expenses, which the IRS defines “as any expense used to relieve or prevent a physical or mental defect or illness, including dental and vision issues.”While these expenses do not include your monthly premiums, they do include a lot of other things, such as doctor visits (copays, deductibles and coinsurance), dental procedures, eye exams, chiropractic services, prescriptions, and more. The IRS regularly updates what it considers to be “eligible services,” so be sure you always double check the latest federal information.

Monday, May 25, 2020

The Emergency Department Of The Miraculous Regional Health...

Problem (pg. 55) â€Å"Bonnie Bowser, eighty-two years old, fell and severely injured her elbow. She was examined at the Emergency Department of the Miraculous Regional Health System and diagnosed with a fractured olecranon process, and referred to an orthopedic surgeon. The surgeon who examined Mrs. Bowser scheduled her for corrective surgery the next day. He noted in his examination that she had a past medical history of hypertension, diabetes mellitus, two myocardial infarctions with quadruple bypass surgery, and a cerebrovascular accident affecting her left side. She was taking several medications including Lasix (a diuretic), Vasotec (for treatment of hypertension and symptomatic congestive heart failure), Kylotrix (potassium supplement),†¦show more content†¦Standardization is key in hospitals and clinics alike. If a high risk patient such as Bonnie is admitted into an emergency room for a fractured elbow, all of her options should be explained to her. Corrective surgery would be a gr eat option but she needs to be aware of all the risks associated with this procedure and any outcome that could occur. I’m sure if she was told that it is not recommended for someone at her old age or poor health status to undergo surgery, she would have taken more time to think about it. Something this serious should be discussed with family before going through with the procedure. This adverse event should be escalated properly so that the administration and other doctors are aware of the outcome. This death could have been prevented, and others should be able to learn from this. We don’t know the full story from this short problem described in the book, but many questions arise from the situation. Was she completely aware of the risks? Did she know she was not a good candidate for the surgery? Question 2: What system-wide rules will you propose to avoid a repetition of such cases, as the head of your state’s Department of Health? Spearheading from the last question, the regulatory categories pertain to this as well. The provider is responsible for putting the patient’s welfare above anything else, and system-wide rules should

Thursday, May 14, 2020

Analysis of Janette Okes Love Comes Softly Essays

Analysis of Janette Okes Love Comes Softly The book that I read is called Love Comes Softly by Janette Oke. It is about a woman named Marty who goes out west with her new husband Clem to find their own land so they can start their own life. But while they live there Clem dies and Marty is now a widow. Marty ends up marrying Clark Davis because Clark is also widower. Marty in the end finds true love with Clark. The main Characters in this book are Marty (Davis), Clark Davis and Missie Davis. Marty is a widow who marries Clark because Clark wants a wife and mother for his child Missie. Clark is the man who marries Marty because he feels that his little girl Missie needs a mother because Clark says that there are just some things†¦show more content†¦Marty soon figures out that love isn’t a blast of fireworks sometimes love just comes softly. Marty doesn’t fit in with the Davis family at first, but then begins to realize that it is Marty’s job to teach Missie the things she needs to know. The plot is that Marty needs a place to stay for the winter before she goes back east (home) because her husband Clem had just died and he was the reason Marty was out there. Marty marries Clark that way she can have a place to stay and she can help raise Missie and teach Missie how to do things that her father can’t teach her. I.e. sewing. The only reason Marty married Clark was because she needed a place to stay until the spring. Marty and Missie develop a love and hate relationship, but as they spend more time together they realize that they actually have a few things in common. When Clark soon finds out that Marty is pregnant, he is glad that Marty is having a little one of her own. Marty ends up naming the child Claridge. In the end Marty asks Clark in a note to ask her to stay and be the permanent mother of Missie (and Claridge.) Clark says yes. He said yes because at that point Marty had been living with him for about 9 months and had grown to love Marty. I think that the

Wednesday, May 6, 2020

Violence And Its Effect On The Road Of Violence - 2596 Words

Violence is a concept which can be felt more aptly than defined. The word ‘violence’ rightly mentions the causation of injury or harm.It is an umbrella term that incorporates a broad range of violence.Different political analysts and psychologists have defined violence in their own institutionalized way. Violence is the opposite of Peace as peace is defined as â€Å"absence of violence†. Here violence becomes a broad concept and demands to be distinguished. Johan Galtung, defines violence as the difference between the potential and the actual, between what could have been, and what is . He has broadened the road of violence by dividing it into three parts depending on the basis of how they operate:Personal or Direct Violence,Structural Violence and Cultural Violence. Direct violence is the manifestation of the anger or frustration and the intention is to strike the person directly. The mode of manifestation can be both verbal and non-verbal. This type of violence is most threatening and fearful type because human beings are being harmed directly using actions or words. Cultural violence can be defined as a violence that is justified by using certain aspects of the culture. This violence is invisible but there is a clear intention to harm or even kill.Basically,this violence is used as a justification to direct and structural form of violence. Structural Violence emerges out of the creation of social structures and institutions that deprive some people of their rights and theShow MoreRelatedThe Effects Of Violence On Children Today1633 Words   |  7 Pagesof this paper is to critically examine research of how violence in the media affects children today. This paper critiques the research by W. James Potter and his article â€Å"On Media Violence.† Facts and personal opinions on the author’s beliefs regarding the affects of violence in the media will also be included. This article talks about how violence in the media is affecting our children today. We have become phlegmatic by the affect violence has on us, when regularly watching television shows, newsRead MoreViolence in the Media Does Not Contribute to the Violence in the Society1733 Words   |  7 Pagesdiscuss whether violence in media contributes to the violence in the society. The essay will first define who the society is and what constitutes as violence in both the media and in society. It will then discuss audience reception studies and the uses and gratifications theory as to how the audiences receive the media and what they do with it. With evidence from supporting articles and a survey done, this essay will argue that violence in the media does not contribute to the violence in society. Read MoreThe Three Stages Of Violence1662 Words   |  7 PagesThe three stages of violence. According to the article, The Cycle of Domestic violence, there are three stages of violence. They are defined as the tension-building stage, the explosive stage, and the honeymoon stage (Domestic Violence Roundtable, 2008). The tension-building stage. The first stage, is the tension-building stage. This stage is known by a time of extreme stress and tension. During this time, the batterer (or abuser) may become overly agitated, and begin acting aggressively. It isRead MoreThe Negative Results of Childhood Exposure to Domestic Violence 979 Words   |  4 Pages The phrase â€Å"domestic violence† typically refers to violence between adult partners. Sadly, it has been estimated that every year between 3.3 and ten million children are exposed to domestic violence in the confines of their own home (Moylan, Herrenkohl, Sousa et al. 2009). According to research conducted by John W. Fantuzzo and Wanda K. Mohr (1999): â€Å"Exposure to domestic violence can include watching or hearing the violent events, direct involvement (for example, trying to intervene or callingRead MoreA Peaceful and Charasmatic Leader, Martin Luther King Junior 600 Words   |  3 Pagesbut upon research, it seems clear that th e Martin Luther King Junior’s approach to the civil rights movement was most effective, because he was a powerful yet inspirational leader. Martin Luther King Junior was a charismatic leader, never using violence to put a stop to inequality. He followed the ways of Mahatma Ghandi, to which both of them were peaceful. Boycotts, protests, marches, that were effective, putting an end to racial discrimination. He proved that a peaceful approach to social inequalityRead MoreEssay on cartoon violence779 Words   |  4 Pages Animation Violence nbsp;nbsp;nbsp;nbsp;nbsp;Children from the ages 6-11 spend more time watching television than they do in the classroom. The â€Å"renaissance of TV animation† has undoubtedly led to more violent cartoons then ever before. But to talk about cartoon violence, it must first be defined. Webster’s Dictionary defines violence â€Å"as the act (or threat) of injuring or killing someone.† (Webster) And although the violence is not real, a child does not know the difference. Throughout theRead MoreViolence And Violence Among Children901 Words   |  4 Pageshas decreased overall an increase in senseless violence being committed by young people leaves individuals trying to understand what is to blame. â€Å"It is encouraging that the rate of crimes of violence in the United States has dropped about 15 percent since 1999. However, self-reported violent offending by American youth has not declined.† (Funk et al. 1) Work place violence, road rage disputes and mass sch ool shootings are just a few examples of violence that has become common place in society. AdolescentRead MoreAffect Violence on Television has on Children Essay690 Words   |  3 PagesAffect Violence on Television has on Children Don’t Young Children â€Å"Sponge It† from Television? If a stranger gives a candy and â€Å"junk food† to a child, the kid enjoys eating such foods even though they produce the harmful effects of rotting away at his teeth. With a parent to limit child’s intake of such harmful sweets, however, the child is protected from their damage. Similarly, the American public enjoys viewing violent and abusive programs at the risk of adapting aggressive and unacceptableRead MoreTelevision Is Destroying Todays Youth, but Dont Blame T.V., Blame the Parents.1302 Words   |  6 Pagesbeen Americas favorite source of entertainment. As society has changed, violence and sexual content have been added ever so increasingly over the years. After all, isnt that what makes T.V. shows interesting? Isnt that why we all want to go see that new movie that came out which is rated R instead of that movie rated PG? Although this violence and sexual content on television and in movies is having devastating effects on Americas youth, you cannot blame television. Instead, we must blameRead MoreThe Effects Of Domestic Violence On The United States930 Words   |  4 Pagesphones have both positive and negative effects for the victims of abuse. Although Domestic Violence is a well-known phenomenon, â€Å"Domestic Violence is a pattern of behavior used to establish power and control over another person through fear and intimidation, often including the threat or use of violence† (Domestic Violence: Statistics Facts 2015). From 2003 to 2012, 21% of all violent crimes were caused by domestic violence and 15% of domestic violence was committed by an intimate partner (Morgan

Tuesday, May 5, 2020

Looking into WILD by Troye Sivan free essay sample

Idolized by the great Taylor Swift, Troye Sivan’s EP, WILD, is definitely something to be revered. Australian YouTube star Troye Sivan debuted his third EP on the 4th of September, with all his 3,000,000 fans there to support him. His EP mixed electro and dream pop melodies to convey the deep messages. WILD is a bold, spectacular second major release that doesn’t incorporate the cliche pop and indie music that most singers would nowadays. Troye Sivans breathtaking album consists of six songs, featuring music artists such as Broods and Tkay M. â€Å"Fools† starts off with a soft piano ballad which quickly builds up to an electronic beat as well as a deep background chorus repeating the lyrics â€Å"only fools.† Sivan ties everything together in this song by combining many different rhythms and vocals to produce a unique blend of music. Another one of Sivan’s tracks, â€Å"Ease,† includes an appearance of Broods. We will write a custom essay sample on Looking into WILD by Troye Sivan or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page He wondrously brings a bundle of upbeat tempos and even possesses the sound of a xylophone which flawlessly matches the song. â€Å"Bite† and â€Å"DKLA† include soothing echoing vocals as well as a feature of Tkay Mazida in â€Å"DKLA.†The heavy bass is apparent in Troye’s songs, adding on the the overall vibe. On the first listen, I didn’t think WILD was exceptionally remarkable. However, as I listened closely to the lyrics and the melodies, I was drawn in. When I had Troyes EP on repeat on Spotify for the 100th time, I was attached to it even more. His music made me feel laid-back and got me thinking deeply about life and all of its imperfections. He doesn’t just simply state the message of his songs, but rather uses lyrics which most people cannot understand if not fully analyzed. In his song â€Å"Bite,† he states, â€Å"The rapture in the dark puts me at ease. The blind eye of the storm.† Sivan toys with the lyrics on purpose, making it a puzzle for those who listen of his music to really look into the what he is saying and interpret the message of his songwriting. The tone of his voice is raw; it is authentic. Emotion can be heard ever so clearly just from the first few words spoken from any of the songs on his EP. Troye Sivan’s WILD contains very mature content with very deep ideas conveyed to his audience about love. However, it is much more than just the basic love songs played on the radio over and over again nowadays. His inspiration to compose WILD came from his fans and his â€Å"past life†. He hoped his new EP and music videos would help those who are struggling with being LGBT+(lesbian, gay, bisexual, transgender, etc.). As a homosexual person himself, Troye has faced some obstacles. â€Å"Every time I see a young LGBT person commit suicide, all I can think about is the lost potential, and what could have happened if only a family member had been a little bit more supportive, or someone at school had been a little bit more supportive,† Sivan states in an interview. His song lyrics are messages about being treated unfairly for being different. This mini-album has caught people’s attention from all over the world, reaching #1 in over 40 countries. WILD has received media praise from famous music celebrities like Sam Smith. Fans of Troye Sivan from all over the world could see his growth in music from last year’s album TRXYE to this year’s WILD. Give this EP a listen and get yourself hyped up for his full album, Blue Neighborhood, coming out December 4, 2015.

Monday, April 6, 2020

How to Make Standardized Tests Less Like a Nightmare

When it comes to major standardized tests or coursework—the sort that can determine whether you get in to a particular high school, college, or graduate program or whether you obtain professional certification—you could probably use all the help that you can get (by the way, you always ask our experts for assistance, see our homepage to find out more). Of course, you’re going to have to invest mounds of personal effort and energy, but the entire process can be made a lot less stressful with expert help. Fear not: We’ve put together a massive list of tips and tools to ease your way through standardized test prep and coursework writing, whether it’s the SAT, GRE, GMAT, ACT, or GSCE that’s got you worried. Tips for Understanding Standardized Tests Standardized testing is meant to provide  schools  with an evaluation tool that evens out the vast heterogeneity in students’ educational backgrounds and serves as a reliable alternative to grades and recommendations. These tests have been designed to test the knowledge of and elicit correct responses from as wide a variety of people as possible. They also have been designed to distinguish people who guess wildly from those who follow a logical train  of thought. We should make a disclaimer right about now and point out that no amount of exam prep will make up for an inadequate primary or secondary education. Or for a long history of lousy attendance and paying poor attention in class. However, if you’ve been keeping up with your classwork over the years, consider your bases covered.

Sunday, March 8, 2020

The Effects of Peer-to-Peer File Sharing On the Music Industry and Possible Technical Solutions The WritePass Journal

The Effects of Peer-to-Peer File Sharing On the Music Industry and Possible Technical Solutions References The Effects of Peer-to-Peer File Sharing On the Music Industry and Possible Technical Solutions CHAPTER ONE INTRODUCTION1.0.   Overview1.1. Background1.2. Problem Statement1.3. Significance of the Study1.4. Research Questions1.5. Limitations and Delimitations of the Study1.6. Chapter SummaryCHAPTER TWO LITERATURE REVIEW2.0.   Introduction 2.1. Historical Overview and Current Findings2.2. Effects of Peer to Peer filesharing 2.2.1. Economic impact on the music industry2.2.2. The legal implications of filesharing2.2.3. Public perception in the usage of filesharing2.3. Recent studies 2.4. Chapter Summary CHAPTER THREERESEARCH METHODOLOGY 3.0. Introduction3.1. Area of study3.2. Research design3.3. Target population3.4. Sampling technique 3.5. Instrumentation3.6. Data collection3.7.   Statistical data analysis3.8. Reliability and validity3.9. Ethical consideration4.0. Chapter summaryCHAPTER FOURRESULTS 4.0. Introduction4. 1. Descriptive data: Findings from the focus group4.2. Chapter SummaryCHAPTER FIVEDISCUSSION, SUMMARY, IMPLICATION AND CONCLUSION5.0. Introduction5.1. Discuss ion of the results5.2. Summary of the results5.3. Practical implications and recommendation for future research5.4. ConclusionsReferences Related CHAPTER ONE INTRODUCTION 1.0.   Overview The advancement in technology has in one way or the other led to the discovery of the Internet and its associated benefits. Individuals across different age groups have found the Internet very helpful in their day-to- day activities as it has increasingly become a source of information and vital services. Quoted among these services include the numerous social networks that allow surfers to share files by passing them from one place to another via the Internet. This service has been variously referred to as Peer-to-Peer (p2p) filesharing and is lauded to have brought joy and laughter to over 60 million people across the globe. The music industry and related associations would not be included in these statistics because research work has shown a great dichotomy (Alejandro, 2005). Experts have been cited as saying that filesharing becomes an illegal activity when copyright material is made available without the permission of the rights holders particularly recording studios in the musi c industry. In view of this argument, research findings have shown that filesharing involves the trading of digital files with other users over the internet causing untold financial suffering to the affected companies and institutions. This act of Peer-to-Peer filesharing has received a widespread adoption and facilitation due to a number of factors. Firstly, the increasing Internet bandwidth and the widespread digitization of physical media files have substantially made home PCs capable of managing digitized audio and video files in a far much better way (Ethan, 2007). This has additionally made it relatively easy to transfer several files from one computer to another across the Internet using various file management networks as observed by Eric (2008). Further observations by Ethan (2007) have revealed that the music industry has repeatedly shown concerns over the potentially devastating impacts of online music sharing. In this regard, the present study has proposed to analyze the effects of p 2p file sharing on the UK music industry and effectively recommend viable solutions to this heinous act. The first chapter is presented through the sections discussed hereunder. 1.1. Background Published works in this area indicate that the majority of people across all age groups are currently involved in downloading all forms of information freely from the internet. All sorts of information including copyrighted material are readily made available online by various filesharing websites resulting in adverse financial repercussions to the concerned companies. According to claims by Stephen (2007), social networks such as Facebook and Napster are shown to have made filesharing a commonplace phenomenon amongst the world’s young population. Additionally, Stephanos Spinellis (2004) further observe that peer to peer has been equated to the sharing of popular music and other kinds of digital data transfer. This concept of filesharing is definitely very popular with consumers the world over as is evidenced by the rapid escalation of p2p application networks that are growing faster than any other technology (Moya, 2008). It is further stated that p2p technologies have gener ated heated debate among players in the media industry for their unauthorised distribution of copyrighted material (Shuman, 2002). This has led to the raising of the red flag in the music industry due to the enormous financial losses in recent times occasioned by the increased decrease in the sale of record labels as noted by Phillips (2010). The argument in the foregoing paragraph is reportedly found to have resulted in the growing concerns over music piracy in the past few years. It is however in order to mention here that the nature of technology has changed tremendously owing to the fact that the popularity of music artists is short lived and the market situation changes abruptly (Phillips, 2010). This fact has effectively forced music artists to join the fight against piracy in defense of their plight according to reports by Peter (2008). In the views of Sean (2004), artists from both concerts and recorded music sales are shown to be the real gainers from illegal filesharing at the expense of record labels. This claim is supported by the increased revenue collections from the said artists over the past five years as underlined by Felix Koleman (2004). It has therefore become more necessary and fundamental for the music companies to address this very disturbing issue. According to Felix Koleman (2004), the net effec t of illegal filesharing in the UK and elsewhere in the world has been the reduction of legitimate sales and the eventual decline of spending on recorded music. Although it is impossible to estimate the actual cost of unlawful P2P filesharing to the music industry, reports show that close to  £180 million have been lost annually by the UK music industry as quoted by Ethan (2007). In view of the increasing illegal filesharing activities especially in downloading music files, it has become necessary for the music companies in UK to come up with appropriate initiatives that can arrest this situation. 1.2. Problem Statement Bhattacharjee et al (2006) have noted that there are devastating impacts associated with filesharing particularly in the emergence of digital libraries that seem to embrace the concept of communal property where virtually everything is shared. The overall impact of filesharing according to Frans (2008) will be an increased concern to the publishing industry whose livelihood is put under eminent threat. Since digital files are easily copied, perpetrators of filesharing are simply publishing large volumes of data denying the rightful owners their dues (Britz, 2002). For these pertinent issues, urgent interventions need to be urgently initiated in order to address these afflictions. 1.3. Significance of the Study The results of this study are deemed critical in attempting to address the impacts and effects of file sharing on the financial health status of the music industry in the UK. This study used the general aims and objectives mentioned hereunder in embarking on this fundamental exploration. It therefore aimed to: find the status of file sharing and music downloads in the United Kingdom analyze the impact of file sharing on the music industry in the UK and the eminent legal solutions available for the music companies and recommend viable suggestions to protect the rights and stop illicit download of music by the users 1.4. Research Questions Given the magnitude of the issue at hand, the following research questions were used to conduct the survey: What are the effects of Peer-to-Peer file sharing on the UK music industry? What are the legal implications for those engaged in file sharing? What are the possible technological solutions to the effects of Peer-to-Peer file sharing? 1.5. Limitations and Delimitations of the Study All field studies have been known to face a number of limitations. The most notable in this study was the existence of method bias attributed to the use of a single questionnaire in the collection of data. This impacted on the validity and reliability of the instrument because of the possibility of inflating the relationships existing between constructs under study (Masters, 2010). The respondents also showed some marked indifferences towards participating in the study due to a loss of interest probably from monotony. Moreover, time and cost constrains played a major role in challenging the completion of the study. These limitations were mitigated in one way or the other by initiating appropriate measures as each case demanded. 1.6. Chapter Summary The chapter introduced the primary themes prevalent in the research and addressed all the major issues in the context of the study. It outlined the essence of the study, explaining the problem and significance of the study as well as the research questions being addressed. The chapter finally identified the limitations that the research had to contend with. This was in line the findings of the vast body of literature search reviewed by the researcher in the next chapter. CHAPTER TWO LITERATURE REVIEW 2.0.   Introduction On reviewing literature related to the effects of filesharing, it reveals that very little discussion and research work has been done in attempting to come up with technological solutions viable in addressing this retrogressive problem. According to Phillips (2010), the existing knowledge gap is found to be lacking in proposals aimed at innovating viable mechanisms for both the music industry and Internet Service Providers to enter into a collective licensing agreement that would help them solve their impasse. Suggestions by Klaus (2005) find it amicable for ISPs and individual users to pay a flat fee in exchange for unrestricted use of any p2p filesharing technology for downloading music.   As noted by Liebowitz (2006), this solution would result in the music industry being compensated for their currently infringed-upon copyrighted works and would promote the use of p2p filesharing technology by more users. This according to the views of Gribble et al (2002) will translate to more users utilising p2p filesharing and hence the music industry would receive more money in fees. In view of this realization, it has become very necessary for experts to investigate the outlawing aspect of filesharing in view of tracing the root cause and magnitude of the said problem particularly on the fiscal aspect. This chapter delves into an in-depth search of related literature in an attempt to discovering the enormity of the vice. 2.1. Historical Overview and Current Findings The term filesharing has been defined as the act of exchanging digital files between users over the internet (Wally, 2004). It is an activity perpetrated by users who download and upload files to be accessed by peers without the express permission of the rights holders. As observed by Peter (2008), this action is considered illegal when copyright material is shared between peers without the consent of the producers. Further observations made by Bhattacharjee et al (2006) indicate that filesharing came into existence with the advent of computing and informatics discipline. This is dated back to the late 70s when files are reported to have been first exchanged on removable media using computers (Alejandro, 2005). In the mid 80s, this practice is further indicated to have advanced into using more reliable and effective servers to share files. These earlier forms of filesharing are reported by Britz (2002) to have given way to the Internet Relay Chat in 1988 and Hotline of 1997 which wer e both able to allow users to communicate remotely through chatting and file-exchanging. The standardization of MP3 encoding in 1991 substantially reduced the size of audio files and grew rapidly throughout the 90s to its current state.   According to arguments by Ethan (2007), the MP3 format is currently offering music by unsigned artists and serves close to over five million audio downloads daily across the globe. Apart from this seemingly short history, arguments by Klaus (2005) demonstrate that the earlier forms of filesharing were comparatively primitive and purposed mainly to provide a platform for the exchange of text-based messages as well as allowing users to encode files and distribute them to participating subscribers through attachments. At the time, published works in archives claim that files were generally stored on large central servers with all users connected to that server in order to download files (Shuman, 2002). Additional reports by Sean (2004) further illustrate that the period between 1979 and the mid 1990s saw the perpetration of filesharing being effectively done through bulletin board systems and Usenet. But still in the same line of thought, Stephen (2007) argues that the advent of peer-to-peer (p2p) software facilitated direct filesharing system between users effectively removing the necessity of a central server. Instead, all operational sites simply index the loca tion of the files on each participating individual’s computer (Stephanos Spinellis, 2004). This enables users to download popular files very quickly by connecting to multiple users. In another development, reports allude that the release of Napster as a centralised unstructured peer-to-peer system sometime in 1999 opened the doors to free access to digital files. After the blocking of Napster in 2000, Gnutella was released as the first decentralized filesharing network in the continent with all connecting software being considered equal and with no possibility of failure as observed by Alejandro (2005). The eventual shutting down of Napster late in 2001 saw the escalating migration of users to other P2P applications and file sharing continued its exponential growth as propounded by Eric (2008). The most outstanding development is witnessed before the end of 2004 when Kazaa network reigned as the most popular file sharing program before its decline from bundled malware and legal battles in various countries across the globe. The collapse of Kazaa gave way to the development of the modern day Spotify which is a music streaming service offering unlimited streaming of selected music from a range of major and independent record labels with virtually no buffering delay (Felix Koleman, 2004). The Spotify system is currently accessible using a number of operating systems including Microsoft Windows, Linux and several mobile devices like the iPhone and those compatible with web OS as highlighted by Britz (2002). Further highlights by Frans (2008) indicate that music can be browsed by artist, album, record label, genre or playlist in addition to direct searches. According to observations proffered by Masters (2010), there is a link on desktop clients that allows the listener to purchase selected material via partner retailers. Reports abound indicate that the company Spotify was incepted in 2006 (Phillips, 2010) but was launched for public access in late 2008. According to 2010 statistics, the Spotify service had approximately seven million users; about 250,000 of these being paying members. Immediately after opening its access to the public, Spotify is reported to have announced licensing deals with many major music labels and was opened for free registration in the UK in 2009 (Masters, 2010). Ostensibly, this provision attracted a surge in registrations following the release of the Spotify mobile service forcing Spotify to close its open registrations in the UK towards the end of the same year as observed by Masters (2010). The free service is now invitation-only, although it was possible to bypass the invitation system for several months by opening the registration page directly. This loophole had then been closed and the registration page required an invitation code. Subscriptions may still be purchase d without an invitation. 2.2. Effects of Peer to Peer filesharing In the views of Peter (2008), Internet distribution of music without the consent of the copyright owner harms the careers of current and future artists firstly because record companies would have fewer sales and secondly because musicians, singers, songwriters and producers depends heavily on royalties and fees gained from their music. This claim is supported by study findings indicating that filesharing is a big hurt to sales even though not to the precise degree â€Å"the record industry would like the public to believe†.   Additionally, p2p and the impact of filesharing upon so many delicate matters have got into the top list of most controversial issues and are poised to remain there for a long time. Because it engages the boundaries and the interests of innovators, content owners and consumers; it has triggered new, difficult and definitely interesting questions significantly regarding how the interests of some IP owners should affect the development of technology (Shum an, 2002). All in all, available data is substantial to conclude that online illegal filesharing has some negative influence on conventional sales even though the size of this effect is highly debatable (Stephen, 2007). The Digital Economy Act is the latest Government crackdown on illegal file sharing. The perpetrators accused of illegally downloading music and films will receive a letter via their respective Internet Service Providers (ISP). This could result in repeat copyright infringers having internet access slowed or blocked altogether under secondary measures in the act. As of April 2011, the Digital Economy Act will not come into force for at least another six months due to a high court challenge from BT and TalkTalk respectively (Halliday 2011). 2.2.1. Economic impact on the music industry The economic effect of copyright infringement through peer-to-peer filesharing on music revenue has been controversial and difficult to determine.   But a recent report by Phillips (2010) indicates that the UK music sector lost an estimated  £200m in 2009 to online copyright infringement due some 7.3 million people engaged in unlawful filesharing. The report further predicted that the cumulative cost to music companies will run into  £1.2bn between the years 2007 and 2012. Losses of this magnitude are clearly unsustainable and suggestions call for the support of Internet service providers and the government to assist the music community in tackling the issue. According to published statistics, music sales dropped globally from approximately $38 billion in 1999 to $32 billion in 2003 attributed to illegal filesharing. Additional reports by the MPAA as quoted in Stephen (2007) indicated that American studios lost $2.3 billion to Internet piracy in 2005, representing approximately one third of the total cost of film piracy in the United States. In yet another study conducted by independent Paris-based economics firm TERA in 2010 (cited in Masters, 2010), it was estimated that unlawful downloading of music, film and software cost Europe’s creative industries several billion in revenue each year. Moreover, the study predicted that losses due to piracy are expected to reach as much as 1.2 million jobs and â‚ ¬240 billion in retail revenue by 2015 if the trend is not checked (Phillips, 2010). Research findings conclude that piracy rates of 25% or more for popular software and operating systems have been common even in countries and regions with strong intellectual property enforcement. Hence, small independent labels have pointed out that the negative economic impact of illegal file sharing on them and their grass roots artists cannot be denied as it is difficult to compete with unauthorized free distribution of their copyrighted music as envisioned by Masters (2010). 2.2.2. The legal implications of filesharing Since the increase in home internet connections and download speeds in recent times, the unauthorised sharing of copyrighted music and video files has become increasingly popular. According to estimates by Peter (2008), close to six million people are confirmed to be regularly filesharing copyright content without permission. The music and film industries have tried largely in vain to prosecute those who perpetrate this kind of activity. But a breakthrough was achieved in 2009 with the successful conviction of a key player in the filesharing industry as reported in Phillips (2010). Many observers claim that this outcome could have significant implications for the future of filesharing in the world at large. The current breakthrough involved the successful conviction of the four owners of The Pirate Bay, the world’s most high-profile filesharing website for breaking copyright law (Sean, 2004). The presiding court found the four guilty as charged and were sentenced to one yearâ €™s imprisonment and ordered to pay damages amounting to $4.5m as outlined by Masters (2010). The foregoing revelation is critical in demonstrating the enormity of legal implications of engaging in illegal filesharing. The court case in reference in this discourse was made airtight following reliable testimony adduced from computer forensic experts that established that the facilitation of filesharing can concretely be considered a crime in itself (Eric, 2008). The basis of this court ruling was found to reside in the fact that a breach of copyright by the filesharing application was evident and the perpetrators were indeed aware of providing material protected by copyright for access to the public. Following this ruling, experts stipulate that other filesharing site owners and perhaps even p2p software developers could be convicted of breach of copyright (Bhattacharjee et al, 2006). Even claims are rive citing the giant Google search engine as earmarked for prosecution for providing links to copyrighted material that has been uploaded without authorisation (Bhattacharjee et al, 2006). 2.2.3. Public perception in the usage of filesharing As already indicated elsewhere in this dissertation, filesharing has been perpetrated with such abandon across various nations in the world using the internet. Research findings have variously illustrated that most of the perpetrators of this vice have been much ignorant of their actions arguing that there is nothing wrong in exchanging files with peers. A case in point is presented by Alejandro (2005) who claims that an estimated 70 million people participated in online filesharing in 2004. Additionally, a CBS News poll reported by Felix Koleman (2004) indicated that nearly 70% of those aged from 18 to 29 years thought filesharing was acceptable in some circumstances while 58% of all Americans who followed the filesharing issue considered it acceptable in at least some circumstances. It is also indicated that some 32 million Americans aged over 12 years had downloaded at least one feature length movie from the Internet early 2006 with over 80% of them reportedly having used the p2p software (Peter, 2008). Alternatively, 40% of the population sampled felt that downloading copyrighted movies off the Internet constituted a very serious offense equitable to taking a DVD from a store without paying for it according to 78% of the focus group. This comparison was short in substance by ignoring the obvious distinction that taking a DVD from a store deprives the store owner of an object that they could otherwise sell to another person while downloading data does not deprive a business from selling that very same data to another person as explained by Phillips (2010). Moreover, filesharing results in creating an enormous illegal library of music available for illegal download thus constituting stealing and cheating which deprives the government and the music industry tens of millions of pounds each year. Finally, it is indicated that 20% of Europeans used filesharing networks to obtain music in mid 2008 with 10% percent using paid-for digital music services such as iTunes (Masters, 2010). Another survey conducted in UK by Phillips (2010) found that 75% of the British public polled was aware of what was legal and illegal in relation to file sharing. There was however a significant divide as to where they felt the legal burden should be placed with 49% believing P2P companies should be held responsible for illegal filesharing on their networks while 18% viewed individual file sharers as the culprits and another 18% either didn’t know or chose not to answer (Phillips, 2010). In the same survey, 60% of people reported downloading music because of a limited budget. A common attitude concerning music downloading was that of ‘why should one pay for something when they can get it for free?’ as observed by Phillips (2010). 2.3. Recent studies According to study findings presented by Alejandro (2005) on the public opinion about filesharing, it was effectively reflected that filesharing economically hurts music and record sales. Although this was also found to be true of other numerous economic studies, their conclusions fell short of pinpointing the precise degree â€Å"the record industry would like the public to believe† the extent of their financial hurt (Felix Koleman, 2004). One disturbing study conducted in 2004 by two economists significantly deviated from these findings by concluded that music filesharing’s effect on sales was â€Å"statistically indistinguishable from zero† as reported by Felix Koleman (2004). The results of this research were challenged by many as having been doctored and manipulated to suit the selfish intentions of the researchers (Liebowitz, 2006). Similarly, a 2006 study published by Industry Canada as quoted in Ethan (2007) made the conclusions that filesharing has no measureable effect on the sales of CDs. These conclusions were contradicted by another study in 2007 conducted by the Institute for Policy Innovation cited by Phillips (2010) that upheld that copyright infringement of movies, music and software, including unauthorized downloading costs the US economy some 373,375 jobs and $58 billion in annual output. Using a recent Billboard report of 2010, Phillips (2010) indicated that the production of music, books and movies has increased tremendously since the advent of file sharing. This in effect negated the very fact the recently observed decline in record sales is due to file sharing. In fact, proponents of filesharing hold that illegal downloading had not deterred people from being original. They remained creative with or without the motivation of monetary incentives particularly those in creative industries. In their views therefore, adduced data on the supply of new works are consistent with the argument that file sharing did not discourage authors and publishers in any way (Phillips, 2010). 2.4. Chapter Summary This chapter has delved into an examination of an extensive and diverse body of literature by attempting to review relevant literature in the area of Peer to Peer file sharing. Most recent studies have also been scrutinized and found to have been broad-based and not touching on the in-depth effects of illegal file sharing particularly in the music industry. These studies have also been found to be defining to the quest for knowledge as they endeavour to shed light of whether there is any change in direction adopted by the UK music industry and individual companies. Having carried out the evaluation and scrutiny of the literature available from various studies, the next chapter presents the approach that best fits the needs of this study. CHAPTER THREE RESEARCH METHODOLOGY 3.0. Introduction This dissertation used the quantitative approach to realize the aims and objectives set originally at its inception. It thus took the form of a case study approach which is deemed desirable to facilitate the exploration of the impact of p2p file sharing on the UK music industry through empirical methods. The quantitative method was found to be appropriate in this study due to the fact that it is guided by a practical model according to highlights by Balsley (2006). It is further pinpointed by Davies (2007) that the quantitative method of research is one that is made up of counting and measuring events and performing the statistical analysis of a body of numerical data. The method is observed to be highly deductive and particularistic; implying that the study is ought to produce reliable and valid data. In view of this argument, the researcher employed the said approach in collecting reliable data that was ideal in addressing the impacts of the said research question. 3.1. Area of study The researcher set out to investigate the effects of p2p file sharing on the UK music industry and the possible technical solutions that can be instituted by the concerned parties. The area of study was confined within UK companies dealing with music production, recording, publishing and distribution. The researcher therefore selected the EMI Music Company for the purpose of this study as it happened to be one of the worlds’ leading music company and home to some of the most successful and best known recording artists (Sean, 2004). All aspects of data pertaining past and present record sales including losses incurred by the Company due to filesharing were collected. 3.2. Research design Usage of the quantitative research method was found to be most appropriate in studying the effects of p2p file sharing on the UK music industry since emphasis is laid on an intensive examination of the settings (Davies, 2007). Since this was a case study, the approach was used because it usually promotes an intensive and detailed examination of the case at hand (Davies, 2007). As a research method, it is used in many situations to increase knowledge of individual, group, organizational, social, political, and related phenomena as observed by Davies (2007). The conclusion of the dissertation demonstrated results of high reliability levels since all data was gathered through empirically correct research manipulations. 3.3. Target population The focus group in this study was specifically composed of individuals found to have some interest in the music industry and had direct relevance to the research question being investigated. Employees of the EMI Music Company and members of the general public who were involved with the Company in one way or the other took part in the study. This sample of the population was subjected to interviews in order to collect primary information regarding various aspects of legal sanctions and their policies on handling copyright infringement. In addition, a well structured questionnaire was administered to managers in the marketing, distribution, sales and account departments respectively in order to collect appropriate data required in achieving the aims and objectives of the study. The focus group was very inclusive by considering representation in terms of number and gender issues where ten respondents from each category of respondents were sampled. This brought together fifty (N=50) participants composed of both males and females in equal proportions where possible. Similarly, secondary data was collected by going through official documents of the sampled Company as well as using library sources dealing with the area of concern. Extensive review of various hardware and software was done in order to address the issue in present era. 3.4. Sampling technique The target population was selected through stratified random sampling procedure for use in the collection of primary information. The researcher had pre-identified the EMI Music Company in UK from which the focus group was sourced. As earlier indicated, the target population comprised of forty managers and ten members of the general public concerned with the sale and distribution music records. The managers helped in extracting answers pertaining to the technological and legal assistance used to prevent illegal download of copyrighted music. Similarly, the researcher randomly consulted official documents particularly financial reports and policy documents of the sampled companies for the study. Finally, the researcher consulted library and other printed sources to support the primary sources.   3.5. Instrumentation The research design employed in this dissertation was a simple survey design of a questionnaire constructed by the researcher by concentrating on the key issues outlined in the statement of the research problem. As already detailed from the outset, employment of library based research design of secondary information from multiple archival sources was exploited to compare and validate the primary sources of empirical materials (Davies, 2007). There is a rich source of secondary empirical materials available for any researcher conducting a survey in the area of social sciences. These sources are argued to be endowed with rich organisational information. The questionnaire was physically administered by the researcher to the focus group to complete and eventually returned for analysis alongside data obtained through secondary means. 3.6. Data collection In this survey, primary data was collected from the focus group by use of the questionnaire technique. This information focused on achieving the aims and objectives of the study and in providing viable recommendations to the research problem under investigation. The survey instrument was thus distributed to the respondents by the researcher to complete and return for analysis. All of the participants were provided with a questionnaire each where the researcher sent out fifty questionnaires to be completed by both the Company employees and members of the general public. These included four sets of questionnaires each sent to the identified departments in the sample company and one set to the general public. In essence, this population was researched because it was made up of all the key stakeholders within the area of investigation. A cover letter of introduction was included with the questionnaire so as to let the respondents know what the research was attempting to accomplish and he nce the significance of giving honest responses. The second round of data collection on the other hand sought to understand the company’s approach and analyse its components in order to provide a potential practice model for companies involved in the music industry.   This mix of method was necessary to supplement each other and thus validate the data collected. 3.7.   Statistical data analysis It was fitting to rigorously analyse the data collected in consideration of the findings of the survey. The results of the questionnaire under exploration were first of all subjected to a rigorous statistical analysis as already mentioned using the computer program statistical package for social science (SPSS).   This data evaluation was in line with the study objectives set earlier aiming to investigate the impact of filesharing on the UK music industry. Alongside data obtained from other secondary sources, it was used to analyze the impact of file sharing and the measures adopted to prevent illegal download of music online. All categorical items on the survey were completed using a 5-point scale format ranging from the minimum value (strongly disagree) to the maximum value (strongly agree). Items that did not receive a response were coded as missing values (Davies, 2007). 3.8. Reliability and validity The reliability of the survey instrument was assessed by Cronbach’s alpha coefficients and those values above 0.7 were considered to have acceptable reliability (Davies, 2007). When checked against other such instruments used in research, reliability of the survey design used in this study might have been lacking probably because the questionnaire was constructed by the researcher and thus not standardized (Davies, 2007). Validity was found to be low just as is the case with most field researches. 3.9. Ethical consideration The issue of confidentially was exhaustively addressed when carrying out this survey. It was addressed in the introductory letter by stating that information obtained was not to be divulged in any unauthorised manner (Davies, 2007). The questionnaire used also ensured the issue of anonymity to the respondents by signing the distributed consent forms. Secondly, the researcher made sure that the instrument was very gender sensitive and balanced between both sexes. Finally, the researcher made sure that all the print and audio media were used in accordance with copy right requirements in conducting the secondary research. There are no other issues as the research was mainly dealing with people who were conversant with the subject matter of the study. 4.0. Chapter summary In this chapter, the rationale for the research approach has been clearly provided giving a vivid clarification of how the descriptive statistics will be applied to achieve the desired research goals of investigating all nuances of peer to peer filesharing in the UK music industry. The study has attempted to address the concepts of reliability and validity in this chapter. Similarly, the ethical considerations found resident in this study were also highlighted. The researcher thus went ahead to carry out an extensive data analysis as described in detail in the next chapter. CHAPTER FOUR RESULTS 4.0. Introduction This chapter is concerned with the presentation of the descriptive data for the population sample studied in the primary research using the questionnaire instrument distributed by the researcher. In this section, the researcher presents the findings obtained from the focus group in the study.   It is the researcher’s contention that the results obtained using the said research design are most reliable given that the focus group the survey set out to investigate was properly sampled. 4. 1. Descriptive data: Findings from the focus group The findings indicate that the questionnaire instrument was completed by all focus group participants (N=50). The first question which had sixteen items was used to assess the general attitudes towards peer to peer file sharing. 57% of the respondents indicated that file sharing was significant in forcing music companies to cut on production and this variable was more important than anything else. It was closely followed by the fact that majority of the participants engaged in online file sharing on a regular basis at 46.6%. Moreover, a number of the respondents interviewed indicated that they preferred getting free music downloads from the internet at 45.9% which was a very significant percentage. The fact that filesharing was a result of technological advancement and the recording industry was losing money due to file sharing were both least important in contributing to the respondents’ attitudes towards the question under study. Most of them seemed to allude that the record ing industry was losing money due to poor economy rather than as a result of file sharing (Alejandro, 2005). The means and standard deviations of all the items in this variable are shown in Table 1 below. All the items were measured on the five-point scale from one to five on the survey instrument shown in the Appendix. Table 1:   Frequencies, Percentages, Means and Standard Deviations of General attitudes towards peer to peer filesharing variables (n = 50) Variables F % Mean S.D Prefer free music downloads 34 45.9 4.00 0.93 Limited budget 25 33.8 3.04 0.79 Distributing unauthorized copyrighted material 28 37.8 3.19 0.84 A result of technological advancement 23 31.5 2.75 0.77 Engaged in online file sharing on a regular basis 34 46.6 4.03 0.95 Consider file sharing an innocent activity 31 41.9 3.30 0.89 Often use of peer-to-peer file sharing software 33 44.6 3.43 0.92 File sharing changing user’s livelihood for worse 25 33.8 3.04 0.79 File sharing forcing music companies to cut on production 42 56.8 4.20 0.98 File sharing forcing music companies to lay off employees 34 45.9 4.00 0.93 File sharing helps in marketing the music industry 29 39.7 3.30 0.89 Recording industry losing money due to file sharing 23 31.1 2.60 0.76 Decrease in sales of record labels due to file sharing 26 35.6 3.12 0.80 File sharing a threat to the recording industry 32 43.8 3.40 0.90 Use of free file sharing applications 24 32.9 2.80 0.77 Regulating file sharing 28 39.4 3.30 0.89 KEY: S.D = Standard Deviation   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚   F= Frequency The mean of free music downloads, limited budget, distribution of unauthorized copyrighted material, a result of technological advancement, engaged in online file sharing on a regular basis, considering filesharing an innocent activity, using peer-to-peer filesharing software, filesharing changing user’s livelihood for worse, filesharing forcing music companies to cut on production, filesharing forcing music companies to lay off employees, filesharing helps in marketing the music industry, recording industry losing money due to filesharing, decrease in sales of record labels due to filesharing, filesharing a threat to the recording industry, use of free filesharing applications and regulating filesharing were 4.00, 3.04, 3.19, 2.75, 4.03, 3.30, 3.43, 3.04, 4.20, 4.00, 3.30, 2.60, 3.12, 3.40, 2.80   and 3.30 respectively. The standard deviations for the same index were 0.93, 0.79, 0.84, 0.77, 0.95, 0.89, 0.92, 0.79, 0.98, 0.93, 0.89, 0.76, 0.80, 0.90, 0.77 and 0.89 respectively. The results of this Table therefore reveal that all the sixteen variables have significant influence on the participants’ attitudes towards peer to peer filesharing. In line with results of other study findings, the table above confirms that filesharing has been instrumental in forcing music companies to lay off employees to minimize on operational losses supposedly occasioned by reduced record sales (Ethan, 2007). On reflection, the current researcher concludes that file sharing has been critical in marketing the music industry by allowing a number of new artists to become successful through the Internet. Felix Koleman (2004) argue that a big majority of online perpetrators of peer to peer filesharing are ignorant of   their actions as attested by the results showing 41.9% claiming innocence when filesharing. But these observations are negated by the results of Table 2 which indicate the legal implications associated with peer to peer filesharing. Table 2: Frequencies, Percentages, Mean and Standard Deviations of participants’ interpretation of legal implications of peer to peer filesharing (n = 50) Variables F % Mean S.D Holding P2P companies responsible 39 78 3.04 0.89 Government is successfully instituting legal sanctions on file sharing 39 78 3.04 0.89 Legal ramifications to curb losses 31 62 2.17 0.76 Illegal music downloaded with intent to sell 34 68 2.80 0.84 Illegal File Sharing Punishment 32 64 2.80 0.79 Stopping illegal file sharing all together 38 76 3.19 0.90 KEY: S.D = Standard Deviation   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚      F = Frequency The findings indicate that the entire focus group completed the questionnaire instrument on the legal implications of peer to peer filesharing. Approximately close to 78% of the respondents indicated that it was more meaningful to hold P2P companies responsible for illegal filesharing on their networks rather than individual users and that they believe the government is successfully instituting legal sanctions on file sharing (Wally, 2004). This aspect was closely followed by strong beliefs that illegal filesharing should be stopped all together, scoring a significant 76%.   This was followed by arguments that there were no significant foreseeable legal ramifications that could curb losses to the music industry occasioned by filesharing in line with observations made by Stephen (2007). This was at 62% closely in the heels of participants’ feelings that it was not necessary to punish perpetrators of illegal filesharing. The mean for holding P2P company’s responsible, legal ramifications to curb losses, illegal music download with intent to sell, punishment and stopping illegal file sharing all together were 3.04, 3.04, 2.17, 2.80, 280 and 3.19 respectively. The standard deviations for the same indexes were 0.89, 0.89, 0.76, 0.84, 0.79 and 0.90 Table 2 reveals that the five variables are significant in influencing the participants’ informed interpretations of legal implications associated with peer to peer filesharing. The sample in this study seems to suggest that the variable on stopping illegal file sharing all together is the most significant in influencing the participants’ interpretations. But generally, all the five variables were seen as interrelated in this study. Moreover, the researcher sought to understand how the participants characterised theirviews on possible technical solutions that could minimize the impacts of peer to peer filesharing. It emerged that 44.7% of them felt that fining internet users for sharing music on the Internet would be most deterrent to the habitual perpetrators. Another 40.8% of them insisted that they would rather support the suggestion that the identities of repeat offenders of illegal filesharing should be disclosed as a measure to curb the aggression (Frans, 2008). This feeling was similarly reiterated by literature review indicating that P2P file-sharing users wouldn’t want to be openly identified.   These result findings found in the study are shown in Table 3 below. Table 3:   Characterization of participants’ view on possible technical solutions to the impacts of peer to peer filesharing Variables F Response Rate % Allowing the music industry to enter into a collective licensing agreement with ISPs 8 15.5    Individual users pay a fee for unrestricted access to any P2P file-sharing software for music download 5 10.7 Unrestricted use of P2P file-sharing technology would promote record sales worldwide 4 9.7 Increased number of P2P file-sharing users would bring more money in fees to the music industry 9 16.5 Fining internet users for sharing music on the internet would deter them 22 44.7 Blocking Internet access for repeat offenders of illegal file sharing is a viable solution 13 26.2 Disclosing the identities of repeat offenders of illegal file sharing 21 40.8 Formally warning those illegally downloading files will be a viable solution 2 2.9 Results in Table 3 reveal that there were large differences in factors influencingparticipant’s views on possible technical solutions to the impacts of peer to peer filesharing. This differentiation was seen to vary from participant to participant with the least significant variable being that indicating formal warning through writing to those illegally downloading files was likely to become a viable solution. Likewise, the same argument was supported by result findings in the study where 44.7% of the respondents indicated that they strongly believed that fining Internet users for sharing music amongst themselves would be most deterrent as observed by Peter (2008). It must be re-emphasised that blocking Internet access for repeat offenders of illegal filesharing as a viable solution was significant to a number of respondents participating in the study. 26.2% of them sustained this argument and were strongly supported by 16.5% who underscored the importance of increasing the nu mber of P2P file-sharing users in bringing more money in fees to the music industry (Stephen, 2007). It is additionally upheld by 15.5% who believed that allowing the music industry to enter into a collective licensing agreement with ISPs was a realistic technical solution to the peer to peer filesharing problem. Even though not the least significant, 10.7% of the focus group supported the suggestion that individual users be allowed to pay a flat fee for unrestricted access to any P2P file-sharing software for downloading music as noted by Shuman (2002). 4.2. Chapter Summary This chapter has succinctly presented the results from the questionnaire sections handled by the EMI Music Company and the general public. The chapter has thus attempted to address the general attitudes towards peer to peer filesharing as well as the legal implications associated with peer to peer filesharing. The issue of possible technical solutions that can be initiated to arrest the problem has been clearly highlighted. The discussions and implications of these results are presented in the next chapter. CHAPTER FIVE DISCUSSION, SUMMARY, IMPLICATION AND CONCLUSION 5.0. Introduction This is the final chapter of this dissertation and is divided into four sections. The first section handles a brief discussion of the results presented in chapter four. The second section presents a short summary of the study findings. In the third section, the author gives the recommendations that should be adopted for future research in this area. The final section presents the conclusions of the study. 5.1. Discussion of the results The study suggests that there exists a vast discrepancy between the general attitudes held by different individuals towards peer to peer filesharing in the UK. However, these ways are found to be not so much diverse since most of the interviewed respondents demonstrated that there were similar behavioural patterns across music companies in the UK. Demographic factors to begin with play a crucial role in participants’ perceptions of their individual alienations towards peer to peer filesharing. Those aged between eighteen to twenty nine years are reportedly popular with free music downloads with about half of them blaming limited budget for their inclination (Liebowitz, 2006). They similarly demonstrated their often use of peer-to-peer file sharing software in exchanging files amongst themselves. A common attitude concerning music downloading among members of this group was that of ‘why should one pay for something when they can get it for free?’ in line with simil ar observations made by Klaus, 2005). As far as the legal implications of peer to peer filesharing is concerned, there seemed to be a divide with the majority feeling that the legal burden should be placed on the P2P companies for filesharing on their networks at 78%. These results were in line with other study findings by Britz (2002) who observed that about 49% of people believed P2P companies should be blamed with only 18% viewing individual file sharers as the culprits. Those in the younger age cohorts (18-29) reported that they fully supported filesharing even if it is illegal (Gribble et al, 2002). They indicated that they partook file sharing with impunity regardless of the repercussions involved when asked how often they downloaded music. This feeling was further supported by respondents in the current study who indicated that fining and disclosing the identities of repeat offenders of illegal filesharing on the internet may effectively deter them from the vice.   5.2. Summary of the results From the study findings presented in chapter four above, it emerged that the act of file sharing is widespread across all age groups in the UK. The practice was found mostly amongst the younger age group ranging between 18 and 29 years who are reported to be deeply entrenched in the act. This is represented by about 37.8% of them having distributed unauthorized copyrighted material to their peers regardless of the inherent legal implications. It is similarly illustrated that this category of users applied a number of P2P technologies when downloading music from the Internet as attested by 44.6% of the participants. It is also indicated that the use of peer to peer filesharing is attributable to the current technological advancement observed in recent times (Alejandro, 2005). In the views of Phillips (2010), a lot has been done by both the government and music companies in controlling and regulating peer to peer filesharing as attested by study findings. 78% of the focus group in this study believed that the government had instituted legal sanctions on file sharing and scored a very significant value. Moreover, the numerous cases that have been concluded in courts regarding music pirating are a testimony of the government’s commitment in arresting the peer to peer filesharing problem. For instance, the successful conviction of the four owners of the world’s most high-profile filesharing website for breaking copyright law is a case in point as noted by Sean (2004). The Pirate Bay website was severely punished by the presiding court to act as an example to others with similar intentions. The study finally found that several technological solutions suggested by the government and music companies were acceptable by a big percentage of the respon dents. It is only about one third of the suggested solutions that were rated as insignificant by the focus group in the study. 5.3. Practical implications and recommendation for future research In regards to the consideration of the current macro environment, it is clear that the economic downturn is affecting consumer spending power and is stipulated to continue further into the decade. Studies show that since the start of the economic crisis late in 2007, numerous job losses have been witnessed with deteriorating consumer confidence being reported (Sean, 2008). This has fundamentally affected the music industry with a substantial proportion considering it a luxury and hence not a necessity. The researcher has therefore found it necessary to put certain recommendations in place for future research. From the outset, it is the researcher’s views that more research should revolve primarily around the technological solutions that can be instituted to minimize if not arrest the problems associated with peer to peer filesharing. Future research should therefore concentrate on discovering solutions that are more amiable to both the music industry and the Internet user. Secondly, the findings of this study further recommends that something must be done to avert the current growing animosity between the government, music industry and the illegal Internet users over the status of peer to peer filesharing. Available research findings indicate that over 60 percent of people downloading music across the globe do it because of a limited budget (Stephen, 2007). If the economic situation in the world is improved, it is the researcher’s contention that this move would be instrumental in minimizing the number of music downloads due to a limited budget. Moreover, it is the suggestion of the current author to institute more research in the area of peer to peer filesharing in a view to dealing with this problem once and for all. 5.4. Conclusions One thing that becomes apparent after reviewing previous studies on the effects of peer to peer filesharing is the absence of research work into technological solutions as observed by Stephanos Spinellis (2004). The existing knowledge gap does not propose viable mechanisms for both the music industry and Internet Service Providers (ISPs) to enter into a collective licensing agreement that would help them solve their impasse. In the observations made by Frans (2008), the current research proposes the passing of a flat fee to be paid by individual users to have unrestricted access to any available P2P file-sharing software in order to download music. Similarly, fining and disclosing the identities of repeat offenders of illegal filesharing has been found to be a more viable solution as noted in this study. References Alejandro, Z. (2005). â€Å"File Sharing and International Sales of Copyrighted Music: An Empirical Analysis with a Panel of Countries†. The B.E. Journal of Economic Analysis Policy, Vol. 5, Issue 1. Bhattacharjee, S., Lertwachara, K, Gopal, R. Marsden, J. (2006). â€Å"Impact of Legal Threats on Online Music Sharing Activity: An Analysis of Music Industry Legal Actions†, Journal   of Law and Economics 49: 91. Britz, J. J. (2002). Information Ethics: its Demarcation and Application. Maryland: The Scarecrow Press. pp. 194-219. Davies, M. B. (2007). Doing a Successful Research Project: Using Qualitative or Quantitative Methods. Palgrave Macmillan. New York, N.Y. Eric, B. (2008). â€Å"MediaSentry site redesign drops references to litigation†. Ars Technica. Ethan, Smith. (2007). â€Å"Sales of Music, Long in Decline, Plunge Sharply: Rise in Downloading Fails to Boost Industry; A Retailing Shakeout†. Wall street Journal Website. Felix, O Koleman, S. (2006). The Effect of File Sharing on Record Sales: An Empirical Analysis. UNC Chapel Hill. Frans, M. (2008). An introduction to games studies: games in culture. SAGE. Gribble, D. S., Krishna, G Stefan, S. P. (2002). A Measurement Study of Peer-to-Peer File Sharing Systems. Department of Computer Science Engineering. University of Washington. Seattle, WA, USA. Klaus, W. R. (2005). Peer-to-Peer Systems and Applications (Eds). Lecture Notes in Computer Science, Volume 3485. Liebowitz, S. J. (2006). â€Å"File Sharing: Creative Destruction or Just Plain Destruction?† The Journal of Law and Economics, Vol. 49, No. 1. Masters, K. (2010). â€Å"Articles shared on a medical web site – an international survey of non-open access journal editors†. The Internet Journal of Medical Informatics 5 (2). Moya, J. (2008). â€Å"China to Require Video File-Sharing sites to get permits?† Zeropaid. Peter, L. (2008). â€Å"Infringement! Artists Say They Want Their Music Site Dough†. New York Post. Phillips, T. (2010). Digital Economy Bill passes as critics warn of â€Å"catastrophic disaster† Metro. Sean, S. (2004). Music Downloads: Pirates- or Customers? Harvard Business School Working Knowledge. Shuman, G. (2002). Advanced Peer-Based Technology Business Models. MIT Sloan School of Management. Stephanos, A. Spinellis, D. (2004). A survey of peer-to-peer content distribution technologies. ACM Computing Surveys, 36(4):335–371. Stephen, E. S. (2007). â€Å"The True Cost of Copyright Industry Piracy to the U.S. Economy† Institute for Policy Innovation. Wally, W. (2004). Steal this file sharing book. No Starch Press. Halliday, J. (2011) Digital Economy Act: filesharing code delayed by six months. Guardian.co.uk

Friday, February 21, 2020

Qualitative Interface Evaluation Essay Example | Topics and Well Written Essays - 2000 words

Qualitative Interface Evaluation - Essay Example Since this task is important in software development, experts have agreed on eight most basic characters of a good user interface. While evaluating the interfaces in this paper it will be important to look at these characteristics because they will be the basis of over evaluation. The techniques for interface evaluation among other parameters will be looking at these characteristics. They include: 1. Clear The main aim of any interface to enable users access information and complete their tasks with a lot of ease. Have a clear interface where icons and the menus are well placed and have a clear meaning is important for a successful interface. Users should not be frustrated by the symbols or icons on the interface, one should provide a pop-up message with details of the function of that interface this makes it more clear. While pointing at that icon you may not know the function of it but a pop up message appears which explains the function. 2. Concise This means straight to the point users do not want a lot of details in the interface. While making the interface clear one should not be trapped into adding a lot of information to overload the interface. The icons or details should be short to the point. The volume icon has a scale and icons which shows the high and low volume level. Although it is not easy to keep things, clear and concise developers should strive to achieve this. Sources( http://www.usabilitypost.com) 3. Familiar A good interface is one that a new user can easily learn and be able to use from the previous interfaces. While developers strive for uniqueness in their interface one thing should be clear, the interface should be familiar to the users for them to have interest to learn and use them effectively. Naturally, users do not like new things, different environment which they will struggle to adapt. Things that are familiar or terms which one uses should be familiar to the users of the system. A system that uses icons should be keen on the ty pe of the icons they use because the context of the system is very important. The screen shot below shows the user that he/she does not need to learn more about the interface because these are the tasks that they want to accomplish using this application hence easy to use. Sources ( http://www.usabilitypost.com) 4. Responsive This means that the system interface should be fast, users like an interface that enables them to accomplish tasks within a short period. It is frustrating for users to wait longer as their requests are being loaded slowly. The user should also have feedback from the system such as the percentage of work done by the system, remaining time and completion status either failed or successful. When the program is loading for instance, a progressing bar or a spinning wheel indicates the task status. The program below shows the time elapsed, time remaining and the percentage of the task done. 5. Consistent Users will learn and advance well in their interface usage if the design system is consistent. Having a system with different interfaces for each version of the program disorients the users. The placement of the Icons, tabs and other items on the interface must be consistent. For instance Microsoft interface are consistent for its application package which enables users to easily adapt from one application to another. 6. Attractive Making an interface attractive is important because users will enjoy performing their tasks with it and probably look forward to using the

Wednesday, February 5, 2020

Exploratory, Descriptive and Causal Research Essay

Exploratory, Descriptive and Causal Research - Essay Example imarily desires to develop insights into the problem Exploratory research must be an initial research to be conducted to clarify and then define the nature of a problem (Eden, Herrmann and Li, 2004). This is not supposed to provide conclusive evidence and subsequent research is expected. Meanwhile, descriptive research as the name implies, intends to describe the nature of business or market characteristics. It can also be used to produce data (Hughes, 2003), enable researchers to recognize associations among factors of interest. On the other hand, descriptive research cannot explicitly establish causal linkages. Mainly, surveys fall in descriptive research. Similarly, causal research is another type of business research method which aims to discover a cause and effect relationship by generating data beneath controlled conditions. Also it is capable of launching cause and effect between factors with a greater degree of certainty. The objectives as well as the research design and methods of the research problems stated in a-f, are critically analyzed and categorized according to the definition, classification, purpose, characteristics and outcomes of the three (3) research types - exploratory, descriptive and the causal research. 2. There are instances that the business team might want to find out the relationships of particular causal factors to the effects which they are predicting. In this case, they may utilize the causal research process. At the moment causes of the effects which are desired to be predicted will be fully understood, they can invariably improve the ability both to predict as well as to control the corresponding effects (Feldman, 1975). The stage in research by which researcher has to know the responses to the â€Å"why† questions without arriving to precise answers is part of the exploratory study. It is often the initial move in a series of actions that is planned by the marketing team. Exploratory research usually answers research

Tuesday, January 28, 2020

The delft network in the netherlands

The delft network in the netherlands 1 About the Delft network Delft is a city located in the Netherlands, having a population of 96168. It is spread over an area of 24 sq.km. (Wikipedia 2009a). The Delft University of Technology is the largest technical university in the Netherlands, with over 15,000 students (Wikipedia 2009b). Due to the significant student population, cycling is an important mode of transport. Delft is bound by freeways on all sides, except the southern, which is delimited by a highway. The hierarchy of roads in Delft is freeways, highways, main roads, and local roads. The railway line cuts across the city, running in the north-south direction from the centre of the city. A main road and a highway are the main linkages between the two freeways on the either side of the railway line. 2 Transport Problem in Delft The railway line passing through Delft is a component of one of the principal railway connections in the Netherlands, connecting Rotterdam and The Hague. The existing 2-track railway line is insufficient, and it has been planned to be upgraded to a 4-track line. However, due to lack of space to build another viaduct, and environmental problems caused by the railway line, it has been proposed to rebuild the railway line in a tunnel. 2020 is envisaged to be a typical year while the construction is in operation. Thus, Links 10486, 9873, and 9827 will be blocked for all traffic. Due to the detours which would result due to the blocked links, cyclists and cars would have to deal with increased travel times. It is anticipated that Mercuriusweg/Abtwoudse Pad or the Ruys de Berenbrouckstraat links would be used in lieu of the blocked links (Chen 2009). 3 Description of Current scenario and Alternate Scenarios 3.1 Description of the Current Situation 2003 Zones 1-7 are the external zones, whereas the rest of the zones are considered as the internal zones. The internal zones are the primary areas of concern. It has also been given that in 2003, zones 23, 24, and 25 are still under development and there is no travel demand from and to these zones (Chen 2009). 3.2 Description of the Zero-Alternative Situation 2020 By 2020, zones 24 and 25 will have been completely developed. However, Zone 23 would still not have been developed. Infrastructure has been upgraded accordingly to connect zones 24 and 25 with the rest of the city. Zone 12 remains the highest trip generating and trip attracting internal zone, as does Zone 1 amongst the external zones. 3.3 Description of Future Situation during Construction 2020 Considering the future scenario for the city of Delft in 2020 during the expansion of the rail line from 2-track to 4-track, it shall be assumed that this project will be in progress and 2020 will be a typical year. It has been given that during the expansion, Links 10486, 9873, and 9827 will be blocked (Chen 2009). The trip generation remains the same as for the zero-alternate scenario for 2020. 4 Modelling for Current Situation 2003 4.1 Trip Generation For performing the trip generation modelling function, the Zonal-based Multiple Regression model has been employed. It takes into account the linear relationships of the socio-economic characteristics of the households in the zones, which affects the trips produced and attracted for each zone (Ortà ºzar and Willumsen 1999). The following functions have been used for the trip generating model in the case of internal zones: Pi = 0.3RESIDENTSi + 0.06JOBSi + 0.03RESEARCHi + 0.03EDUCATIONi Ai = 0.05RESIDENTSi + 0.75JOBSi + 0.3RESEARCHi + 0.3EDUCATIONi Where Pi = production of zone i, Ai = attraction of zone i, RESIDENTSi = number of residents in zone i, JOBSi = number of jobs in zone i, RESEARCHi = research facility space in zone i, EDUCATIONi = amount of educational services offered in zone i. Source: Chen 2009 For the case of external zones, the numbers of trips generated and attracted have been assessed based on the traffic volume counts. These are as indicated in Appendix 1. For the internal zones, it can be seen that the variable of the number of residents living in each zone is the most dominant one affecting the number of trips produced. The variables which are most dominant for trip attraction are number of jobs, and the research facility space in that particular zone respectively. Appendix 2 indicates the trip generation for 2003, including both the internal as well as the external zones. 2003 histogram.JPGFigure 4-1: Productions and Attractions for the Current Scenario 2003 It can be seen from the Appendix 2 and figure 4-1, Zone 12 is the largest trip generator and attracting external zone. Zone 1 is the highest trip generating and attracting internal zone. 4.2 Trip Distribution and Modal Split The Gravity Model has been employed to generate the trip distribution model. This model is a type of Synthetic Model as â€Å"it estimates trips for each cell in the matrix without directly using the observed trip pattern† (Ortà ºzar and Willumsen 1999 p.159). There are three variants for the Gravity Model function, namely: Exponential Function: f(cij) = exp (-ßcij) Power Function: f(cij) = cij-n Combined Function: cnij exp(-ßcij) Singly constrained versions, in this case destination-constrained, can be produced by making Ai equal to 1, i.e. Ai = 1 and Bj= 1/?iDif(cij) The Combined Function variation of the Gravity Model is the most superior one, as it is the best fit with the actual observed values for trip length distributions of cars (Ortà ºzar and Willumsen 1999). OmniTRANS performs simultaneous modal split, for which the gravity model can be extended to the â€Å"simultaneous gravity model† which is given by: Tijv=p.Qi.Xj.Fv(zijv) Where Tijv= Number of trips from zone I to j via mode v p= Scaling factor Xj= Column Balancing Factor Fv(zijv)= Distribution function taking into account the willingness to travel by mode v given impedance z Appendix 4 indicates the traffic distribution of cars in Delft. 44566 cars have been distributed. As can be seen in Appendix 5, 8635 cyclists have been distributed the entire network of Delft. The modal split indicates that 83.77 percent of the traffic is constituted by cars and 16.23 percent by bicycles. The trip length distribution function for cars can be seen in figure 4-2. This indicates the willingness to travel to a certain distance without any impendence, such as congestion. Hence, in this case the maximum uncongested distance travelled is 10 km. Similarly, figure 4-3 indicates the trip length distribution for bicycles, which experiences its peak at 3 km. The trip time distributions for cars and bicycles have been indicated in Figure 4-4 and Figure 4-5 respectively. These functions, too, follow a similar pattern as that of the Trip Length Distribution. In the case of cars and bicycles, both, the peak is of 12 minutes. The mean trip distance for bicycles is 3.14 km and the mean trip time is 14.22 minutes. Similarly, for cars, the mean distance is 7.59 km and time is 11.12 minutes. Intra-zonal car trips constitute only about 0.57 percent of the total number of trips made by cars, and those made by bicycles constitute about 16.55 percent of the total number of bicycle trips. 4.3 Traffic Assignment 4.3.1.1 Assignment for Cars The General Equilibrium technique of traffic assignment has been used for cars. The condition as given by Wardrop is that â€Å"Under equilibrium conditions, traffic arranges itself in congested networks in such a way that no individual trip maker can reduce his path costs by switching routes† (Ortà ºzar and Willumsen 1999 p.303). Under this traffic assignment model, costs are all perceived in the same way by the trip makers, and hence Stochastic effects are not considered. The following links have the largest traffic flow (for a single direction) of about 7064 cars assigned: 10972, 10973, 11289, 11427, 11428, and 11477. Figure 4-6 represents the traffic assignment for cars in 2003. The colours of the bands, in the graph, indicate the V/C Ratio and the width indicates the traffic load. It reflects that the main road, the east and west freeways crossing the railway are suffering from V/C ratios greater than 1, which requires attention. 4.3.1.2 Assignment for Bicycles The Stochastic Method has been employed for the traffic assignment model for bicycles. This method is superior to the All-Or-Nothing Method, as it takes into account the diversity in the road users perceptions of distance, travel time, generalised costs; and thus considers alternate routes to the best-route choice, given by the All-Or-Nothing technique. This is a suitable model for the traffic assignment of bicycles as this technique does not take into account the congestion effects, which is not calculable since capacities for bicycles are not specified. Link 10850 has been assigned the maximum number of bicycle trips for a single direction, which is 941 trips. Figure 4-7 represents the assignment of bicycles in 2003. Most of the trips are confined to the internal zones. 5 Modelling for Future Situation 2020 The modelling stages for the future scenarios of 2020 will remain the same till the Traffic Assignment Stage, which would differ based on the blocked links for the future construction scenario of 2020. 5.1 Trip Generation The Zonal-based Multiple Regression model has been employed. The functions are the same as those for 2003. However, forecasts for the number of residents, jobs, and the research facility space and education building space in 2020 are different from the current year. Also, it has been given that the productions and attractions generated by the external zones is to be assumed to grow by 15 percent from 2020 to 2003 (Chen 2009). The above figure 5-1 illustrates that Zone 1 still remains the highest trip production and attraction external zone; and Zone 12 continues to remain the highest trip producing and attracting internal zone. The same is reflected through Appendix 3. 5.2 Trip Distribution and Modal Split The Gravity Model has been employed for the trip distribution. A total of about 54380 cars have been distributed, and about 10413 bicycles. The modal split for 2020 demonstrates that about 83.5 percent of the trips would be by cars, and the remaining 16.5 percent by bicycles. For cars, the intra-zonal trips constitute about 0.54 percent, whereas for the bicycles, intra-zonal trips constitute about 15.71 percent of the trips. Trip length distribution function (indicated in Figure 5-2 and 5-3) and the trip time distribution functions (indicated in Figure 5-4 and 5-5) have been generated. The maximum uncongested distance remains the same for both cars and bicycles, as in 2003, as also the maximum uncongested time in the case for cars. For bicycles, the maximum time has reduced to 8 minutes. The mean trip distance for bicycles is 3.26 km and the mean time is 14.75 minutes. Similarly, for cars, the mean distance is 7.56 km and time is 11 minutes. 5.3 Traffic Assignment for Zero-Alternative Situation 5.3.1 Traffic Assignment for Cars The General Equilibrium model has been employed. The following links have the maximum numbers of cars assigned, i.e. about 8346 cars, to them for one direction: Links 10972, 10973, 11289, 11427, 11428, 11477, and 11478. Figure 5-6 represents the assignment for cars. The colours of the bands, in the graph, indicate the V/C Ratio and the width indicates the load of traffic. The freeways continue to have high V/C ratios, as well as the main roads crossing the railway. 5.3.2 Traffic Assignment for Bicycles For the traffic assignment modelling for bicycles, the Stochastic Method has been used again. Link 10850 has been assigned the maximum number of bicycle trips (114 trips). Figure 5-7 represents the bicycle assignment. 5.4 Traffic Assignment for Future Construction Situation In the future situation during construction, the decision to upgrade the railways from two tracks to four tracks has been made. This would result in the closing of Links 9827, 9873, and 10486. 5.4.1 Traffic Assignment for Cars It has been calculated that links 11283, 11407, 11463, and 11464 have the maximum load, of 10723 cars in one direction. Figure 5-8 represents the car assignment considering future construction. The cross-railway link south of zone 17 experiences a greater load, whereby there is a reduction in the northern cross-link. 5.4.2 Traffic Assignment for Bicycles The Stochastic model employed for assigning the bicycle traffic that Link 10452 the maximum load, in one direction, of 1446.54 bicycles. Figure 5-9 represents the assignment for bicycles. 6 Analysis 6.1 Trip Generation Amongst the internal zones, which are of primary concern, Zone 12 is the zone which remains the highest trip producing and attracting zone. This is supported by the fact that Zone 12 has the highest number of residents living in it, and the maximum number of jobs existing in this zone. This zone is located at the heart of the city, adjacent to the railway line and the main road connecting the two freeways. All the internal zones have experienced a growth rate for the number of trips generated and produced by about 11 percent. Zone 1 also remains the highest trip producing and attracting external zone. This may be accounted by the fact that Zone 1 is directly connected to Delft by the railway line, and thus could perhaps be an important junction or location. 6.2 Trip Distribution and Modal Split The trip distribution can be reflected through the study of the matrices given in Appendix 4 to 7. For 2003, the maximum number of car trips has been of the nature Internal-to-External, with the most dominant one being from Zone 15 to Zone 1. This has not changed for 2020. For 2003 and 2020, the most dominant character of bicycle trips is Internal-to-Internal, with maximum trips being made within Zone 12. This is as should be expected, since long distance travel by bicycles is not likely to be made except in rare circumstances. The maximum number of bicycle trips may also be attributed to the fact that Zone 12 is the Delft City Centre. The maximum growth (4.8 times) for car trips has been seen for the pair Zone 7-Zone 1, and the maximum for bicycles (0.15 times) has been for the pair Zone 5-Zone 12. On studying the zone-to-zone average travel distance and time, it can be seen from Appendix 8 and 9 that the maximum increase for trip distance has been from zone 7 to 15 (46.86 percent) and maximum increase in time has been for the pair zone 18 to 22 (48.67 percent). The maximum increase (48.78 percent) in cost has been experienced for zone 11 to 22. The modal split indicates a marginal change from 2003 to 2005, whereby there is a decrease from approximately 83.77 to 83.5 percent for cars. Intra-zonal trips made in 2020 have experienced a fall from 2003. This may indicate greater travel distances and time, and thus greater generalized costs in the future. 6.3 Traffic Assignment On comparing the figures indicating the traffic assignments for the three scenarios, it can be seen that the maximum car trips load remains on the freeways defining Delft on the eastern and western sides. The main difference can be seen between the zero-alternative and construction situation for 2020. Due to the blocked links, car traffic has been assigned to the links 1164, 11645, and Westvest-Hooikade particularly have experienced a significant increase, whereas the Westlandseweg links have experienced a decrease in the load of trips. Also, as was expected, there was an increased use of the Ruys-de-Berenbrouckstraat, and Abtwoudse links. However, the Mercuriusweg saw a decrease in the traffic load as compared to the zero-alternative scenario, which goes against as was anticipated. In the case of assigned bicycle trips, due to the blocked links, the Hof-van-Delftlaan link has seen a substantial increase in the traffic load. The share of the railway crossing traffic has been seen to change for all the three scenarios. This has been indicated in figure 6-1. There is a decrease in the share from 2003 to the Zero-Alternative scenario. However, comparing the future construction scenario with the Zero-Alternative, there has been an increase in the share, for both cars and bicycles. 7 Conclusions Zones 1 and 12 being of prime importance, also supported by their connectivity will continue to dominate as the zones attracting and generating the maximum traffic. Since maximum bicycle traffic load is concentrated in Zone 12, measures may be taken to restrict the entry of cars in this area so as to ensure a more safe environment, which would even benefit the households, as the maximum percentage are located in this zone. Increased generalised costs must be taken into account, based on the above analysis. Links which are experiencing greater traffic loads due to construction works have been identified, and relief measures for these should be planned, particularly for the freeways on the eastern and western side of the city. 8 Strengths and Weaknesses of OmniTRANS The strength of OmniTRANS is that it helps in the rapid and accurate transport modeling procedures. Also, the data can be very easily examined on the transport network map, rather than just being confined to tables and numbers, which makes analysis tedious. Also, a number of variables can be studied, which can be further sorted out based on the direction for any particular link. The weaknesses could be cited as only being able to employ the use of the Simultaneous Gravity Model being available for trip distribution stage. Also, only limited types of traffic assignment models can be performed (such as Stochastic, All-or-Nothing, and Equilibrium). Public transport modelling is also not performed by the software (OmniTRANS 2009). References CHEN, H. 2009. Handout: Coursework Description, lecture notes distributed in TRAN5020 Principles of Transport Modelling. University of Leeds, 3 November 2009. OMNITRANS. 2009. Whats New in OT5 [online]. [Accessed on 1st December 2009]. Available from http://www.omnitrans-international.com/resources/brochures/whats%20new%202008.pdf. ORTÚZAR, J. WILLUMSEN, L.G. 1999. Modelling Transport. West Sussex: Wiley. WIKIPEDIA. 2009a. Delft [online]. [Accessed on 10 November 2009]. Available from: http://en.wikipedia.org/wiki/Delft. WIKIPEDIA. 2009b. Delft University of Technology [online]. [Accessed on 10 November 2009]. Available from: http://en.wikipedia.org/wiki/Delft_University_of_Technology.